On 03/04/17 16:12, Jan Just Keijser wrote:
> Hi Samuli,
> 
> On 03/04/17 15:53, Samuli Seppänen wrote:
>> On 02/04/2017 10:57, Steffan Karger wrote:
>>> Hi,
>>>
>>> On 31-03-17 22:34, David Sommerseth wrote:
>>>> On 31/03/17 10:56, Илья Шипицин wrote:
>>>>> 2017-03-31 13:26 GMT+05:00 Samuli Seppänen <sam...@openvpn.net
>>>>> <mailto:sam...@openvpn.net>>:
>>>>>
>>>>>      Hi,
>>>>>
>>>>>      We still bundle EasyRSA 2 with our Windows installers and it is
>>>>>      prominently advertised on our widely linked to HOWTO:
>>>>>
>>>>>      <https://openvpn.net/index.php/open-source/documentation/howto.html
>>>>>      <https://openvpn.net/index.php/open-source/documentation/howto.html>>
>>>>>
>>>>>      As such, EasyRSA 2 is used by many/most OpenVPN server admins.
>>>>>
>>>>>      However, the default values for EasyRSA 2 such as MD5 hashing 
>>>>> algorithm
>>>>>      and 1024-bit keysize seem totally inadequate for today's standards:
>>>>>
>>>>>      
>>>>> <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/vars#L53
>>>>>      
>>>>> <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/vars#L53>>
>>>>>      
>>>>> <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/openssl-1.0.0.cnf#L57
>>>>>      
>>>>> <https://github.com/OpenVPN/easy-rsa-old/blob/master/easy-rsa/2.0/openssl-1.0.0.cnf#L57>>
>>>>>
>>>>>      I think we should upgrade these to something more recent. What would
>>>>>      more modern reasonable defaults be?
>>>>>
>>>>>
>>>>>
>>>>> someday we decided to use DSA (instead of default RSA)
>>>>> it worked ... until we started to use OpenVPN Connect for iOS.
>>>>> next, we had to change back to RSA
>>>>>
>>>>>
>>>>> the conclusion would be "test all available platforms and take a
>>>>> decision", probably even set up special test server and ask people on
>>>>> openvpn-users mailing list
>>>> Always a good idea to test as many platforms as possible.  But we can
>>>> also leverage all the testing which have been done indirectly by others
>>>> as well.
>>>>
>>>> The suggestion from Samuli is to update the default key size and hashing
>>>> algorithm.  MD5 is broken.  MD5 have been broken for years.  SHA1 have
>>>> the recent SHAttering panic, which have its own set of challenges - and
>>>> should not be used for certificates any longer (if I have understood the
>>>> crypto-gurus correctly).
>>>>
>>>> Also considering that the "world in general" have been moving towards
>>>> stronger keys *and* have moved towards SHA256 hashing in certificates,
>>>> updating EasyRSA is more than reasonable.
>>>>
>>>> So, I would highly recommend using SHA256.  I have used that for my
>>>> OpenVPN setups for several years already.  That works fine for me, and I
>>>> know others have done the same.  This is actually the most challenging
>>>> move, from a technical point of view - using a new algorithm.  But this
>>>> algorithm is well supported by all OpenSSL and mbed TLS implementations
>>>> OpenVPN can be built against.
>>>>
>>>> Secondly, updating the key length from 1024 bits to at least 2048 should
>>>> not cause any issues at all.  Many users (myself included) often use
>>>> 4096 bits keys without any issues.
>>>>
>>>> Swapping RSA for DSA is an issue of a completely different league. And
>>>> DSA is by OpenSSH considered too weak; IIRC it was even removed in
>>>> OpenSSH v7.0.
>>> Yes, upgrading would be good if we still ship it.  I can echo David's
>>> SHA256 / RSA2048+ recommendation.  Enough security margin, and very good
>>> interop (not only crypto libs, but also smart cards, OS key stores,
>>> ...).  To not dramatically slow down connection setup on low-cpu-power
>>> devices (e.g. home routers), don't go beyond RSA4096 though.
>>>
>>> DSA is _not_ a preferred choice.  The original 1024-bit DSA is too weak
>>> nowadays, and the 'larger' DSA variants are not even close to the wide
>>> support that RSA has.
>>>
>>> -Steffan
>>>
>> Hi,
>>
>> I've issue a pull request here and review would be appreciated:
>>
>> <https://github.com/OpenVPN/easy-rsa-old/pull/1>
>>
>> I tested these changes on Debian 8 which has OpenSSL-1.0.1. Key size was
>> set to 4096-bits and signature algorithm to SHA256WithRSAEncryption.
>>
>> The only real issue was DH parameter generation: it took ~25 minutes on
>> my Intel i5 laptop. Is that acceptable default behavior?
>>
> what kind of i5 is this? on my i7-4810 it took 5 minutes. Can you give the 
> full CPUID string (from /proc/cpuinfo) ?  then I can 
> guestimate whether the 25 minutes is realistic for slower hardware.

I've run a a couple of "quick" tests ... on a two different laptops

--- test 1 ----------------------------------------------------------
$ time openssl gendh -out test 4096
[...snip...]

real    35m40.098s
user    35m38.922s
sys     0m0.367s
$ cat /proc/cpuinfo  | grep model\ name | uniq -c
      4 model name      : Intel(R) Core(TM) i5-6200U CPU @ 2.30GHz

<http://ark.intel.com/products/88193/Intel-Core-i5-6200U-Processor-3M-Cache-up-to-2_80-GHz>

--- test 2 ----------------------------------------------------------
$ time openssl gendh -out test 4096
[...snip...]

real    13m59.742s
user    13m59.448s
sys     0m0.140s
$ cat /proc/cpuinfo  | grep model\ name | uniq -c
      4 model name      : Intel(R) Core(TM) i7-5600U CPU @ 2.60GHz

<http://ark.intel.com/products/85215/Intel-Core-i7-5600U-Processor-4M-Cache-up-to-3_20-GHz>


--- test 3 ----------------------------------------------------------
$ time openssl gendh -out test 4096
[...snip...]

real    14m54.432s
user    14m53.475s
sys     0m0.339s
$ cat /proc/cpuinfo | grep model\ name | uniq -c
      4 model name      : Intel(R) Xeon(R) CPU E3-1220L V2 @ 2.30GHz

<http://ark.intel.com/products/53401/Intel-Xeon-Processor-E3-1220L-3M-Cache-2_20-GHz>


The main difference, if I looked at the correct "Intel Ark" page for
your i7-4800 [1], is the CPU cache (yours is 6MB, while the others are
3-4MB.  The i5 have max turbo freq at 2.8GHz, while the others are quite
closer (3.2-3.4 GHz, yours is at 3.8GHz).

[1]
<http://ark.intel.com/products/78937/Intel-Core-i7-4810MQ-Processor-6M-Cache-up-to-3_80-GHz>


-- 
kind regards,

David Sommerseth
OpenVPN Technologies, Inc


Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to